English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 41645248      線上人數 : 1287
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/89713


    題名: 無線感測網路環境下基於可靠信任模型的安全性拓樸控制之設計;Reliable Trust-Based Topology Control against Internal Attacks in Wireless Sensor Networks
    作者: 王薏婷;Wang, Yi-Ting
    貢獻者: 通訊工程學系
    關鍵詞: 信任模型;信任評估;安全性;無線感測網路;網路拓樸;Trust model;trust evaluation;security;wireless sensor networks;network topology
    日期: 2022-09-20
    上傳時間: 2022-10-04 11:53:56 (UTC+8)
    出版者: 國立中央大學
    摘要: 由於無線感測網路(WSNs)環境的開放性,造成容易受到惡意節點的內部攻擊,現有的大多數研究都計算感測器之間的成功率來代表節點的直接信任,使用信任評估模型是檢測未知節點和保證無線感測網路安全的有效方法。然而,如同開關攻擊這種內部惡意行為,在只計算兩個節點間的直接信任模型下,是不足以確保彼此節點是可信的。因此本文提出了一種新穎的信任模型,該模型考慮節點通訊和剩餘電量來計算感測器節點之間的直接信任,並收集鄰居節點的意見來計算間接信任。此外,我們也解釋了直接信任和間接信任之間的權重來做信任值的整合,最後,此模型包含一個基於滑動窗口方法的加權平均來定期更新最終信任值。另外,我們開發了一種基於可靠信任的拓樸控制演算法 (RTTC),以利用我們的信任模型並創建基於安全性的網路拓樸設計。基於模擬結果,我們提出的模型可以準確評估感測器節點的可信度,有效防止安全漏洞。;Wireless sensor networks (WSNs) are vulnerable to internal attacks because of the openness of network environments. Using a trust evaluation model is a helpful approach for detecting unidentified sensor nodes and ensuring security protection in WSNs. However, most existing studies consider the communications between nodes to calculate the direct trust, which may not be enough to compute the trust value due to various internal attacks like on-off attacks and malicious behavior. This thesis proposes a novel trust model that considers communication and residual energy to calculate direct trust between sensor nodes and uses neighbors′ direct trusts to evaluate indirect trusts. Then, the weight between direct and recommendation trusts is explained. Finally, the integrated trust′s value is updated periodically so that this model includes a weighted average operator based on the sliding window method. Furthermore, we developed a reliable trust-based topology control algorithm (RTTC) to utilize our trust model and create a security-based network topology. Based on simulation results, our proposed model can accurately assess sensor nodes′ trustworthiness and effectively prevent security breaches.
    顯示於類別:[通訊工程研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML68檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明